Armitage Introduction : Kali Linux Hacking without Coding

3201

Hacking with ARMITAGE. Armitage is a Graphical Toll (GUI) that combines various Pentesting / Hacking Tools like Metasploit Nmap .
Fast and easy hacking, that’s what the official Armitage website is named as. And fast and easy hacking it is. It is not recommended starting your life as a penetration tester with Armitage. But after you know the basics of metasploit (which you do now), you can take a look at this great tool. And I’ve started to assume you have Kali Linux installed.

Installing Metasploit

Now metasploit is not distributed with Kali Linux (it was distributed with backtrack though). However, Kali has it on its repositories, and it can be easily downloaded and installed by executing-

1

apt-get install armitage

It will check dependencies and download the required file and install Armitage for you. After its done, you can start armitage by using the following code-

1

service postgresql start

1

service metasploit start

1

armitage

You will get a screen like this. Let the settings be as they are, and click connect. You’ll get a prompt like this (most of the time)

Now you’ll see Armitage making some connection for you. For a short while it might show failure messages (Connection Refused), but after some time Armitage will start.
In Kali Linux Sana 2016.1 or 2016.2 that is New releases if some error pops-up about not existence of Database, Open Terminal and type the following command.

1

msfdb init

And you’ll end up with a windows somewhat like this

Armitage Basics

Now the tough coding (honestly there wasn’t anything tough about that) that you had to do with Metasploit, becomes as easy as a click on Armitage. Better yet, you can see exactly what line of code is actually executed when you do something with your mouse. As a start, you should do a quick scan with OS detect.

And while it does ask you to enter some stuff now, it is going to be pretty easy, you just have to follow the example given by armitage with some modification.

First do your old ifconfig on a new terminal to find you IP

1

ifconfig

Notice that most of the time, the first 6 digits are 192.168. You have to figure out the next 3 digits. After that, you can enter the ip into the armitage window. Look at the sample it had provided, just copy that, and, replacing the 1 with 154 as in my case. You final code should be 192.168.154.0/24. The 0/24 means it’ll look at all the IPs from 192.168.154.1 to 192.168.154.256. Actually it scans IP from 192.168.xxx.0 through 192.168.xxx.255. Most of the time, you’ll find your host in this range, however, to include all IP from 192.168.0.0 to 192.168.255.255, you may use 192.168.0.0/16.

This is the automatically generated code after clicking OK.

Now, after a few seconds, you will see the following message, and it tells you exactly what you’re supposed to do next.

Now a couple of computers with respective OS icons will show up on your screen. As expected, you’ll have to go to Attacks -> Find attacks. There’s no rocket science here, and I’m not putting any more screenshots. After that, right click on the computer you want to hack, and you’ll see an attack option. Select whichever you want to try, enter the requisites . Everything will be quite easy, except for the fact that the exploits in attack section will be possible exploits, that might or might not work. If you’re expecting a click to hack you a Windows 7 machine, then that’s just not happening. It might work with an unpatched XP machine, a ms03_026_dcom might do the trick, or the netapi one. Good luck with playing around with this tool. And here’s the official Armitage website (media section link, useful vids and pics there) where you might find some more guidance, though the tool doesn’t need any.

New Hacking Articles

I started this blog out of interest somewhere 7 Years back. I had really no idea what Hacking is back then, So I have decided to refresh the articles and re-write articles that is for Security / Hacking . Slowly I will be removing all the content that is unrelated or doesn’t belongs to Hacking. So expect Articles related to Windows , Mobile, Free Content, code etc gone, and more more and many more Articles on Cyber Security and Hacking to come.
Join us on Telegram – https://t.me/ethicalhackx